Banasthali University

Displaying 1-18 of 18 results

  • White Papers // Oct 2013

    Performance Evaluation of Real Time Database Systems in Distributed Environment

    Transaction scheduling plays an important role in deciding the performance of a Real Time DataBase System (RTDBS) in distributed environment. It has been demonstrated that the priority based scheduling enhances the performance of a RTDBS in distributed environment. The performance is primarily measured by the number of transactions completed within...

    Provided By Banasthali University

  • White Papers // Sep 2013

    An Overview of Distributed Data Base Security Issues in Cloud Computing Environment

    Cloud computing is a computing paradigm that delivers on demand IT services to consumers. It is a technology which provides development of large-scale, on-demand, flexible computing infrastructures. It is a construct that allows users to access applications that actually reside on Internet-connected devices. It delivers applications, infrastructure and platform as...

    Provided By Banasthali University

  • White Papers // Jan 2013

    A Framework for Automated Database TuningUsing Dynamic SGA Parameters and Basic Operating System Utilities

    In present scenario the manual work cost more to an organization than the automatic work and the ratio is increasing day by day as per the tremendous increment in Machine (Hardware + Software) Intelligence. The authors are moving towards the world where the Machines will be able to perform better...

    Provided By Banasthali University

  • White Papers // Aug 2012

    Role of Ranking Algorithms for Information Retrieval

    As the use of web is increasing more day by day, the web users get easily lost in the web's rich hyper structure. The main aim of the owner of the website is to give the relevant information according their needs to the users. The authors explained the Web mining...

    Provided By Banasthali University

  • White Papers // Aug 2012

    An Robust Pollution Control Strategy for P2P File Sharing System

    Despite being currently one of the main internet application. P2Pfile sharing has been hampered by content pollution attack. To tackle this problem, the authors introduce a novel pollution control strategy that consisting in adjusting the rate in which content disseminated, according to content version reputation. The proposed strategy is modeled...

    Provided By Banasthali University

  • White Papers // Jul 2012

    A Contemporary Proportional Exploration of Numerous Routing Protocol in VANET

    During the last few years, VANET has become an active area of research. Vehicle on road like car, busses, van etc. perform the role of node in VANET that moved in unbounded area and in any direction with varying speed. These nodes makes traffic in VANET and have high dynamic...

    Provided By Banasthali University

  • White Papers // Jun 2012

    A Comparative Study on Software Architectural Styles for Network Based Applications

    Software architecture defines the components and the interaction in between the components of a system. It also defines how the components are interacting with each other, the dependency in between the components and the interface protocols used for communication. For a network-based application, system performance is based on network communication....

    Provided By Banasthali University

  • White Papers // Apr 2012

    FPGA Implementation of Serial Peripheral Interface Bus

    This Serial Peripheral Interface (SPI) is a communication protocol which provides communication between chips like microprocessors, microcontrollers and peripheral devices like ADC's, DAC's, flash memories. It is a Synchronous protocol named by MOTOROLA. This SPI bus is implemented on FPGA. SPI is having one master and a no. of slaves....

    Provided By Banasthali University

  • White Papers // Nov 2011

    Reducing Papr of OFDM Based Wireless Systems Using Companding with Convolutional Codes

    OFDM is a promising broadband technique. However, the implementation disadvantage of OFDM is Peak-to-Average Power Ratio (PAPR) which outweighs all the potential benefits of OFDM. In this paper, a new scheme will be introduced, that combines selective mapping and companding technique to reduce PAPR. However, companding technique is a distortion...

    Provided By Banasthali University

  • White Papers // Sep 2011

    Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 Enabled Wireless Sensor Networks

    Wireless Sensor Network (WSN) is emerging as a major research field in computer networks over the last decade due to its wide variety of embedded real time applications. Sensor networks have infrastructure-less architecture because of frequently varying topology and link status. Routing is an extremely challenging task for battery-powered resource-constrained...

    Provided By Banasthali University

  • White Papers // Sep 2011

    Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

    Wireless Sensor Networks, are made of low-cost, low-power, small in size, and multifunctional sensor nodes. The efficient energy utilization is one of the important performance factors for wireless sensor networks survivability because nodes operate with limited battery power. In this paper, the authors propose and analyze a new approach of...

    Provided By Banasthali University

  • White Papers // Jul 2011

    Application Domain of Wireless Sensor Network: - A Paradigm in Developed and Developing Countries

    Wireless sensor networks are network of small sensing devices, which collaborate with each other to gather process and communicate over wireless channel information about some physical phenomena. These self-organizing, highly robust and energy efficient networks can be excellent sentinels for monitoring underground mining, wildlife and various physical infrastructures such as...

    Provided By Banasthali University

  • White Papers // Feb 2011

    Load Balancing in Wireless Ad-Hoc Networks With Low Forwarding Index

    A wireless ad-hoc network comprises of a set of wireless nodes and requires no fixed infrastructure. For efficient communication between nodes, ad-hoc networks are typically grouped in to clusters, where each cluster has a clusterhead (or Master). In the study, the authors will take a communication model that is derived...

    Provided By Banasthali University

  • White Papers // Dec 2010

    An Improved Cryptanalytic Attack on Knapsack Cipher Using Genetic Algorithm

    With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. The application of genetic algorithms in the cryptanalysis...

    Provided By Banasthali University

  • White Papers // Sep 2010

    Constructing Minimum Connected Dominating Set: Algorithmic Approach

    Connected Dominating Set is popularly used for constructing virtual backbones for broadcasting operation in WSNs. UD Graph is the most suitable model for a wireless sensor network. In this paper the authors provide an algorithm to find MCDS in UD Graph. It is based on the computation of convex hulls...

    Provided By Banasthali University

  • White Papers // Jul 2010

    Optimized Channel Assignment in Distributed Environment

    Channel assignment problem in wireless network is closely related to vertex coloring problem. The problem is to assign channels to hosts in such a way that interference among hosts is eliminated and the total number of channels is minimum, which is equivalent to vertex coloring of a graph with minimum...

    Provided By Banasthali University

  • White Papers // May 2010

    Information Security and Sender's Rights Protection Through Embedded Public Key Signature

    Information security is not just to provide an authenticity and integrity to the data, but there is also a need to seek identity, rights of use and origin of information, which may require some degree of process re-engineering. Rarely security technologies like digital signatures can be simply "Plugged in" without...

    Provided By Banasthali University

  • White Papers // Oct 2009

    Multi-Agent System Interaction in Integrated SCM

    Coordination between organizations on strategic, tactical and operation levels leads to more effective and efficient supply chains. Supply chain management is increasing day by day in modern enterprises. The environment is becoming competitive and many enterprises will find it difficult to survive if they do not make their sourcing, production...

    Provided By Banasthali University

  • White Papers // Nov 2011

    Reducing Papr of OFDM Based Wireless Systems Using Companding with Convolutional Codes

    OFDM is a promising broadband technique. However, the implementation disadvantage of OFDM is Peak-to-Average Power Ratio (PAPR) which outweighs all the potential benefits of OFDM. In this paper, a new scheme will be introduced, that combines selective mapping and companding technique to reduce PAPR. However, companding technique is a distortion...

    Provided By Banasthali University

  • White Papers // Jul 2012

    A Contemporary Proportional Exploration of Numerous Routing Protocol in VANET

    During the last few years, VANET has become an active area of research. Vehicle on road like car, busses, van etc. perform the role of node in VANET that moved in unbounded area and in any direction with varying speed. These nodes makes traffic in VANET and have high dynamic...

    Provided By Banasthali University

  • White Papers // Jun 2012

    A Comparative Study on Software Architectural Styles for Network Based Applications

    Software architecture defines the components and the interaction in between the components of a system. It also defines how the components are interacting with each other, the dependency in between the components and the interface protocols used for communication. For a network-based application, system performance is based on network communication....

    Provided By Banasthali University

  • White Papers // Jan 2013

    A Framework for Automated Database TuningUsing Dynamic SGA Parameters and Basic Operating System Utilities

    In present scenario the manual work cost more to an organization than the automatic work and the ratio is increasing day by day as per the tremendous increment in Machine (Hardware + Software) Intelligence. The authors are moving towards the world where the Machines will be able to perform better...

    Provided By Banasthali University

  • White Papers // Oct 2013

    Performance Evaluation of Real Time Database Systems in Distributed Environment

    Transaction scheduling plays an important role in deciding the performance of a Real Time DataBase System (RTDBS) in distributed environment. It has been demonstrated that the priority based scheduling enhances the performance of a RTDBS in distributed environment. The performance is primarily measured by the number of transactions completed within...

    Provided By Banasthali University

  • White Papers // Sep 2013

    An Overview of Distributed Data Base Security Issues in Cloud Computing Environment

    Cloud computing is a computing paradigm that delivers on demand IT services to consumers. It is a technology which provides development of large-scale, on-demand, flexible computing infrastructures. It is a construct that allows users to access applications that actually reside on Internet-connected devices. It delivers applications, infrastructure and platform as...

    Provided By Banasthali University

  • White Papers // Sep 2010

    Constructing Minimum Connected Dominating Set: Algorithmic Approach

    Connected Dominating Set is popularly used for constructing virtual backbones for broadcasting operation in WSNs. UD Graph is the most suitable model for a wireless sensor network. In this paper the authors provide an algorithm to find MCDS in UD Graph. It is based on the computation of convex hulls...

    Provided By Banasthali University

  • White Papers // Feb 2011

    Load Balancing in Wireless Ad-Hoc Networks With Low Forwarding Index

    A wireless ad-hoc network comprises of a set of wireless nodes and requires no fixed infrastructure. For efficient communication between nodes, ad-hoc networks are typically grouped in to clusters, where each cluster has a clusterhead (or Master). In the study, the authors will take a communication model that is derived...

    Provided By Banasthali University

  • White Papers // Oct 2009

    Multi-Agent System Interaction in Integrated SCM

    Coordination between organizations on strategic, tactical and operation levels leads to more effective and efficient supply chains. Supply chain management is increasing day by day in modern enterprises. The environment is becoming competitive and many enterprises will find it difficult to survive if they do not make their sourcing, production...

    Provided By Banasthali University

  • White Papers // May 2010

    Information Security and Sender's Rights Protection Through Embedded Public Key Signature

    Information security is not just to provide an authenticity and integrity to the data, but there is also a need to seek identity, rights of use and origin of information, which may require some degree of process re-engineering. Rarely security technologies like digital signatures can be simply "Plugged in" without...

    Provided By Banasthali University

  • White Papers // Dec 2010

    An Improved Cryptanalytic Attack on Knapsack Cipher Using Genetic Algorithm

    With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. The application of genetic algorithms in the cryptanalysis...

    Provided By Banasthali University

  • White Papers // Jul 2011

    Application Domain of Wireless Sensor Network: - A Paradigm in Developed and Developing Countries

    Wireless sensor networks are network of small sensing devices, which collaborate with each other to gather process and communicate over wireless channel information about some physical phenomena. These self-organizing, highly robust and energy efficient networks can be excellent sentinels for monitoring underground mining, wildlife and various physical infrastructures such as...

    Provided By Banasthali University

  • White Papers // Sep 2011

    Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 Enabled Wireless Sensor Networks

    Wireless Sensor Network (WSN) is emerging as a major research field in computer networks over the last decade due to its wide variety of embedded real time applications. Sensor networks have infrastructure-less architecture because of frequently varying topology and link status. Routing is an extremely challenging task for battery-powered resource-constrained...

    Provided By Banasthali University

  • White Papers // Jul 2010

    Optimized Channel Assignment in Distributed Environment

    Channel assignment problem in wireless network is closely related to vertex coloring problem. The problem is to assign channels to hosts in such a way that interference among hosts is eliminated and the total number of channels is minimum, which is equivalent to vertex coloring of a graph with minimum...

    Provided By Banasthali University

  • White Papers // Sep 2011

    Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

    Wireless Sensor Networks, are made of low-cost, low-power, small in size, and multifunctional sensor nodes. The efficient energy utilization is one of the important performance factors for wireless sensor networks survivability because nodes operate with limited battery power. In this paper, the authors propose and analyze a new approach of...

    Provided By Banasthali University

  • White Papers // Apr 2012

    FPGA Implementation of Serial Peripheral Interface Bus

    This Serial Peripheral Interface (SPI) is a communication protocol which provides communication between chips like microprocessors, microcontrollers and peripheral devices like ADC's, DAC's, flash memories. It is a Synchronous protocol named by MOTOROLA. This SPI bus is implemented on FPGA. SPI is having one master and a no. of slaves....

    Provided By Banasthali University

  • White Papers // Aug 2012

    Role of Ranking Algorithms for Information Retrieval

    As the use of web is increasing more day by day, the web users get easily lost in the web's rich hyper structure. The main aim of the owner of the website is to give the relevant information according their needs to the users. The authors explained the Web mining...

    Provided By Banasthali University

  • White Papers // Aug 2012

    An Robust Pollution Control Strategy for P2P File Sharing System

    Despite being currently one of the main internet application. P2Pfile sharing has been hampered by content pollution attack. To tackle this problem, the authors introduce a novel pollution control strategy that consisting in adjusting the rate in which content disseminated, according to content version reputation. The proposed strategy is modeled...

    Provided By Banasthali University